Skip to content

Mantis 🔸

Enumeration

Web server shows a template of a landing page. feroxbuster discovers a /bugtracker.

Searching for an exploit, we find https://mantisbt.org/bugs/view.php?id=23173.

Initial Access

We start the rogue server from https://github.com/allyshka/Rogue-MySql-Server.

Visit http://192.168.169.204/bugtracker/admin/install.php?install=3&hostname=192.168.45.206

We can read config_inc.php file after seeing it in the mantis repo.

We have the database credentials.

c7870d0b102cfb2f4916ff04e47b5c6f

Using hashcat.

https://mantisbt.org/bugs/view.php?id=26091

Get the flag.

Privilege Escalation

We see a backup script but can't see it; there is a cron job.

Using pspy64.

We see the password BugTracker007.

sudo -l shows that mantis has full privileges, so...

Post Exploitation

Get the flag.